咨询与建议

限定检索结果

文献类型

  • 305 篇 会议
  • 249 篇 期刊文献
  • 6 篇 学位论文

馆藏范围

  • 560 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 502 篇 工学
    • 444 篇 计算机科学与技术...
    • 148 篇 电气工程
    • 102 篇 信息与通信工程
    • 75 篇 软件工程
    • 23 篇 网络空间安全
    • 21 篇 电子科学与技术(可...
    • 21 篇 控制科学与工程
    • 9 篇 机械工程
    • 8 篇 仪器科学与技术
    • 8 篇 交通运输工程
    • 6 篇 材料科学与工程(可...
    • 4 篇 石油与天然气工程
    • 3 篇 安全科学与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
  • 76 篇 理学
    • 51 篇 数学
    • 15 篇 物理学
    • 11 篇 生物学
    • 6 篇 化学
    • 2 篇 天文学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 31 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 14 篇 医学
    • 12 篇 基础医学(可授医学...
  • 4 篇 农学
    • 3 篇 水产
  • 3 篇 经济学
    • 2 篇 理论经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 哲学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 560 篇 secure multi-par...
  • 82 篇 privacy
  • 53 篇 homomorphic encr...
  • 45 篇 secret sharing
  • 38 篇 privacy-preservi...
  • 32 篇 federated learni...
  • 28 篇 cryptography
  • 24 篇 differential pri...
  • 24 篇 blockchain
  • 24 篇 protocols
  • 19 篇 privacy preservi...
  • 18 篇 security
  • 16 篇 machine learning
  • 15 篇 privacy preserva...
  • 13 篇 data privacy
  • 13 篇 private set inte...
  • 13 篇 servers
  • 12 篇 oblivious transf...
  • 12 篇 cloud computing
  • 9 篇 computational ge...

机构

  • 9 篇 tech univ darmst...
  • 7 篇 rhein westfal th...
  • 5 篇 univ tokyo
  • 5 篇 ant grp peoples ...
  • 5 篇 bar ilan univ ra...
  • 4 篇 stevens inst tec...
  • 4 篇 univ tartu tartu...
  • 4 篇 harbin inst tech...
  • 4 篇 qingdao univ col...
  • 4 篇 boston univ bost...
  • 4 篇 wuhan univ sch c...
  • 4 篇 beijing univ pos...
  • 4 篇 univ hong kong p...
  • 4 篇 columbia univ ny...
  • 4 篇 natl inst adv in...
  • 4 篇 tno the hague
  • 3 篇 univ sci & techn...
  • 3 篇 univ waterloo wa...
  • 3 篇 zhongguancun lab...
  • 3 篇 chinese acad sci...

作者

  • 10 篇 schneider thomas
  • 9 篇 veugen thijs
  • 9 篇 meyer ulrike
  • 8 篇 wetzel susanne
  • 6 篇 breuer malte
  • 6 篇 pinkas benny
  • 6 篇 kerschbaum flori...
  • 5 篇 liu xin
  • 5 篇 laud peeter
  • 5 篇 feng qi
  • 5 篇 venkitasubramani...
  • 5 篇 he debiao
  • 5 篇 zhang bingsheng
  • 5 篇 ruangwises suthe...
  • 4 篇 kamphorst bart
  • 4 篇 liu yang
  • 4 篇 varia mayank
  • 4 篇 hazay carmit
  • 4 篇 xu gang
  • 4 篇 ren kui

语言

  • 554 篇 英文
  • 6 篇 其他
检索条件"主题词=secure multi-party computation"
560 条 记 录,以下是1-10 订阅
排序:
Privacy-Preserving Power Flow Analysis via secure multi-party computation
收藏 引用
IEEE TRANSACTIONS ON SMART GRID 2025年 第1期16卷 344-355页
作者: von der Heyden, Jonas Schlueter, Nils Binfet, Philipp Asman, Martin Zdrallek, Markus Jager, Tibor Darup, Moritz Schulze Berg Univ Wuppertal Sch Elect Informat & Media Engn D-42119 Wuppertal Germany Tech Univ Dortmund Dept Mech Engn D-44227 Dortmund Germany
Smart grids feature a bidirectional flow of electricity and data, enhancing flexibility, efficiency, and reliability in increasingly volatile energy grids. However, data from smart meters can reveal sensitive private ... 详细信息
来源: 评论
A Lightweight CP-ABE Scheme for EHR Over Cloud Based on Blockchain and secure multi-party computation
收藏 引用
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES 2025年 第2期36卷
作者: Qiao, Jiawen Wang, Na Fu, Junsong Deng, Lunzhi Wang, Jingjing Liu, Jianwei Beihang Univ Sch Cyber Sci & Technol Beijing Peoples R China Beijing Univ Posts & Telecommun Sch Cyberspace Secur Beijing Peoples R China Guizhou Normal Univ Sch Math Sci Guiyang Peoples R China
With the growth of cloud computing and the popularity of electronic health records (EHR), more and more patients and hospitals are uploading EHR to the cloud for storage, retrieval and organization. Due to the privacy... 详细信息
来源: 评论
Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2025年 第1期24卷 1-29页
作者: Gamiz, Idoia Regueiro, Cristina Lage, Oscar Jacob, Eduardo Astorga, Jasone Univ Basque Country UPV EHU Dept Commun Engn Bilbao 48013 Bizkaia Spain TECNALIA BRTA Bizkaia Sci & Technol Pk 700 Derio 48160 Bizkaia Spain
In the era of Big Data and the advancement of the Internet of Things, there is an increasing amount of valuable information. It is important to emphasize that this data is usually sensitive or confidential, so securit... 详细信息
来源: 评论
secure multi-party computation without agreement
收藏 引用
JOURNAL OF CRYPTOLOGY 2005年 第3期18卷 247-287页
作者: Goldwasser, S Lindell, Y Weizmann Inst Sci Dept Comp Sci IL-76100 Rehovot Israel Bar Ilan Univ Dept Comp Sci IL-52900 Ramat Gan Israel
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result... 详细信息
来源: 评论
secure multi-party computation: Theory, practice and applications
收藏 引用
INFORMATION SCIENCES 2019年 476卷 357-372页
作者: Zhao, Chuan Zhao, Shengnan Zhao, Minghao Chen, Zhenxiang Gao, Chong-Zhi Li, Hongwei Tan, Yu-an Univ Jinan Shandong Prov Key Lab Network Based Intelligent C Jinan 250022 Shandong Peoples R China Univ Jinan Sch Informat Sci & Engn Jinan 250022 Shandong Peoples R China Shandong Univ Sch Comp Sci & Technol Jinan Shandong Peoples R China Tsinghua Univ Sch Software Beijing Peoples R China Guangzhou Univ Sch Comp Sci Guangzhou Guangdong Peoples R China Univ Elect Sci & Technol China Sch Comp Sci & Engn Ctr Cyber Secur Chengdu Sichuan Peoples R China Beijing Inst Technol Sch Comp Sci Beijing Peoples R China
secure multi-party computation (SMPC) is a generic cryptographic primitive that enables distributed parties to jointly compute an arbitrary functionality without revealing their own private inputs and outputs. Since Y... 详细信息
来源: 评论
secure multi-party computation for Personalized Human Activity Recognition
收藏 引用
NEURAL PROCESSING LETTERS 2023年 第3期55卷 2127-2153页
作者: Melanson, David Maia, Ricardo Kim, Hee-Seok Nascimento, Anderson De Cock, Martine Univ Washington Sch Engn & Technol 1900 Commerce St Tacoma WA 98402 USA Univ Brasilia Inst Exact Sci Dept Comp Sci BR-70910900 Brasilia DF Brazil Univ Ghent Dept Appl Math Comp Sci & Stat Krijgslaan 281 S9 B-9000 Ghent Belgium
Calibrating Human Activity Recognition (HAR) models to end-users with Transfer Learning (TL) often yields significant accuracy improvements. Such TL is by design done based on very personal data collected by sensors w... 详细信息
来源: 评论
secure multi-party computation with secret sharing for real-time data aggregation in IIoT
收藏 引用
COMPUTER COMMUNICATIONS 2024年 224卷 159-168页
作者: Liu, Dengzhi Yu, Geng Zhong, Zhaoman Song, Yuanzhao Jiangsu Ocean Univ Sch Comp Engn Lianyungang 210005 Peoples R China Jiangsu Inst Marine Resources Dev Lianyungang 210005 Peoples R China Jiangsu Ocean Univ Jiangsu Engn Res Ctr Intelligent Port Lianyungang 210005 Peoples R China Gachon Univ Dept Business Seongnam 13120 Gyeonggi Do South Korea
Real-time analytics in Industrial Internet-of-Things (IIoT) has received remarkable attention recently due to its capacity to prevent downtime and manage risks. However, the sensed data in IIoT is considered private. ... 详细信息
来源: 评论
secure multi-party computation solution to Yao's millionaires' problem based on set-inclusion
收藏 引用
Progress in Natural Science:Materials International 2005年 第9期15卷 851-856页
作者: LI Shundong**, DAI Yiqi and YOU Qiyou(Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China) Department of Computer Science and Technology Tsinghua University Beijing 100084 China
secure multi-party computation is a focus of international cryptography in recent years. Protocols for Yao’s millionaires’ problem have become an important building block of many secure multi-party computation proto... 详细信息
来源: 评论
secure multi-party computation made simple
收藏 引用
DISCRETE APPLIED MATHEMATICS 2006年 第2期154卷 370-381页
作者: Maurer, U ETH Dept Comp Sci CH-8092 Zurich Switzerland
Known secure multi-party computation protocols are quite complex, involving non-trivial mathematical structures and sub-protocols. The purpose of this paper is to present a very simple approach to secure multi-party c... 详细信息
来源: 评论
secure multi-party computation protocol for sequencing problem
收藏 引用
Science China(Information Sciences) 2011年 第8期54卷 1654-1662页
作者: TANG ChunMing 1,2,SHI GuiHua 1 & YAO ZhengAn 3 1 School of Mathematics and Information Science,Guangzhou University,Guangzhou 510006, China 2State Key Laboratory of Information Security, Institute of Software Science,Chinese Academy of Sciences,Beijing 100080,China 3 School of Mathematics and computational Science,Sun Yat-Sen University,Guangzhou 510275,China School of Mathematics and Information Science Guangzhou University Guangzhou China State Key Laboratory of Information Security Institute of Software Science Chinese Academy of Sciences Beijing China School of Mathematics and Computational Science Sun Yat-Sen University Guangzhou China
In the field of multi-party computation,an important problem is how to construct an efficient and secure multi-party computation protocol for certain specific *** the present study,we make use of a secret sharing sche... 详细信息
来源: 评论